Safe address allocation method, detecting device, detecting equipment and detecting system

A technology of detection device and distribution method, applied in the field of data communication, can solve the problems of difficulty in being discovered, control failures such as inspection and binding, and inability to discover access equipment, and achieve the effect of preventing illegal operations

Inactive Publication Date: 2010-05-26
BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, the access device cannot find the intruder at all, and all controls such as verification and binding will be invalid.
[0019] If the behavior of the intruder is more subtle, it does not block any packets of the user equipment, but "parasitizes" on the user line, completely copies the user's IP address, MAC address and other information, and uses the bandwidth of the line to transmit its own data flow. This intrusion method is difficult to detect under the current detection technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe address allocation method, detecting device, detecting equipment and detecting system
  • Safe address allocation method, detecting device, detecting equipment and detecting system
  • Safe address allocation method, detecting device, detecting equipment and detecting system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The purpose of the embodiments of the present invention is to provide a safe address assignment method, detection device, detection equipment, user equipment, DHCP server and a safe address assignment system, so that the DHCP server can safely assign an IP address to a DHCP client to prevent illegal Users steal IP addresses and MAC addresses of legal users to conduct illegal operations.

[0058] The following describes the embodiments of the present invention in conjunction with the accompanying drawings. The embodiments of the present invention provide a secure address allocation method, figure 2 A schematic diagram of Embodiment 1 of a secure address allocation method of the present invention is given, and the method includes:

[0059] Step S1, generating identity verification rules according to the IP address allocation request sent by the user's Dynamic Host Configuration Protocol DHCP client to the DHCP server;

[0060] Step S1 may specifically be: generating an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a safe address allocation method, a detecting device, detecting equipment, user equipment, a DHCP server and a safe address allocation system. By performing regular identity authentication on a user through the detecting device, the embodiment of the invention can use different identity rules in each time of identity authentication to ensure that an illegal user is hard to judge which message is a message for identity authentication and how to authenticate identity, so that the illegal user cannot falsely use the identity of a legal user to access network, and is prevented from embezzling the IP address and the MAC address of the legal user for illegal operation.

Description

technical field [0001] The embodiment of the present invention relates to a safe address assignment method, detection device, detection equipment, user equipment, DHCP server and a safe address assignment system, and belongs to the technical field of data communication. Background technique [0002] Dynamic Host Configuration Protocol (Dynamic Host Configuration Protocol, DHCP for short) is a protocol standard for simplifying host IP configuration management. By using the DHCP protocol, you can use the DHCP server to perform TCP / IP settings for all DHCP-enabled clients on the network, mainly used to automatically set the network Internet Protocol (Internet Protocol, referred to as IP) address, mask, gateway, and domain name for users. System (Domain Name System, referred to as DNS) and other network parameters, and DHCP can also ensure that duplicate addresses are not used, and unused addresses can be recycled and allocated. This simplifies user network settings and improve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12H04L29/06
Inventor 陈锋
Owner BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products